Defeating Denial-of-Service Attacks in a Self-Managing N-Variant System
Best Paper AwardLong Paper
N-variant systems protect software from attack by executing multiple variants of a single program in parallel, checking regularly that they are behaving consistently. The variants are designed to behave identically during normal operation and differently during an attack. When different behavior (divergence) is detected, N-variant systems self-heal by either rolling back to a safe state or restarting. Unfortunately, an attacker can create a denial-of-service (DoS) attack from a diverging input by using it to force an N-variant system into an endless diverge/restart cycle.
This paper describes a defense, CRISPR-Inspired Program Resiliency (Crispy), that automatically protects N-variant systems from such DoS attacks. Crispy mitigates DoS attacks against N-variant systems using an automatic signature generation technique modeled on CRISPR/Cas, the bacterial adaptive immune system. Experiments on two webservers using exploits developed by an independent Red Team showed Crispy protected against 87.5% of DoS attacks with zero false positives. Overhead was minimal and varied according to the number of signatures maintained, which can be tailored to the threat model and performance requirements.
Conference DaySun 26 MayDisplayed time zone: Eastern Time (US & Canada) change
11:00 - 12:30
|Towards Secure Architectural AdaptationLong Paper|
|Defeating Denial-of-Service Attacks in a Self-Managing N-Variant SystemBest Paper AwardLong Paper|
|Blockchain Networks as Adaptive SystemsNIER|
|Towards the Detection of Partial Feature InteractionsNIER|